Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2023, 17:07

General

  • Target

    17f89183d951f5ea258d8d242368a3d8.exe

  • Size

    612KB

  • MD5

    17f89183d951f5ea258d8d242368a3d8

  • SHA1

    41d7143f06a9fe53b6d8fda2b6d7c629c7a7a133

  • SHA256

    e54c38c8d43f2a11ac1c997438d4586a3270f1545f8ef02b8992ebc35005823c

  • SHA512

    65e59efd1e77def251c8def6065b7eb1c8944c0ec3c29f0b59eac3c7aa3dd1ced8b4ac5993804736a6b724528ce36fbd6aaf6c05c86e594eb7a61de644f0d71d

  • SSDEEP

    12288:NcrNS33L10QdrXjZDnDLRH6/cOOScBEcmJE28syNM34odu+K:wNA3R5drX1DDLRHMncBeFySIodrK

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default8

C2

185.225.73.105:8675

185.225.73.105:7896

mloptuytonroyem.sytes.net:8675

mloptuytonroyem.sytes.net:7896

Mutex

AsyncMutex_7SI8ObPWc

Attributes
  • delay

    3

  • install

    true

  • install_file

    cesr.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17f89183d951f5ea258d8d242368a3d8.exe
    "C:\Users\Admin\AppData\Local\Temp\17f89183d951f5ea258d8d242368a3d8.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4692
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\agwkien.cmd" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3692
      • C:\Users\Admin\AppData\Local\Temp\jzfjgshg.sfx.exe
        jzfjgshg.sfx.exe -pwejtnhlopfigsohdfuishgrygfysrsoihfihgsoifghsithngmkaswodtyuiofxvflfadfdyehngfszafugyRhhguhrsugsudbfrgsfskfshbrkgysgrhgnmePvqxsHb -dC:\Users\Admin\AppData\Local\Temp
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1452
        • C:\Users\Admin\AppData\Local\Temp\jzfjgshg.exe
          "C:\Users\Admin\AppData\Local\Temp\jzfjgshg.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1076
          • C:\Users\Admin\AppData\Local\Temp\jzfjgshg.exe
            C:\Users\Admin\AppData\Local\Temp\jzfjgshg.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1740
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "cesr" /tr '"C:\Users\Admin\AppData\Roaming\cesr.exe"' & exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4688
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /f /sc onlogon /rl highest /tn "cesr" /tr '"C:\Users\Admin\AppData\Roaming\cesr.exe"'
                7⤵
                • Creates scheduled task(s)
                PID:1824
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA2C8.tmp.bat""
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1568
              • C:\Windows\SysWOW64\timeout.exe
                timeout 3
                7⤵
                • Delays execution with timeout.exe
                PID:3416
              • C:\Users\Admin\AppData\Roaming\cesr.exe
                "C:\Users\Admin\AppData\Roaming\cesr.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2580
                • C:\Users\Admin\AppData\Roaming\cesr.exe
                  C:\Users\Admin\AppData\Roaming\cesr.exe
                  8⤵
                  • Executes dropped EXE
                  PID:4980
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4980 -s 72
                    9⤵
                    • Program crash
                    PID:3640
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4980 -ip 4980
    1⤵
      PID:1364

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\jzfjgshg.exe.log

      Filesize

      706B

      MD5

      d95c58e609838928f0f49837cab7dfd2

      SHA1

      55e7139a1e3899195b92ed8771d1ca2c7d53c916

      SHA256

      0407c814aef0d62aec7fd39b7c2f614746f0d8ff41f8ef957736f520f14b0339

      SHA512

      405310b29a833604c6627063bfdcf055a197e01f633ef21da238f1a6415a02e21315d689b4a6669db23e82152bed6f3492afb60963e6b2a0e9bb2ac09a480b5d

    • C:\Users\Admin\AppData\Local\Temp\agwkien.cmd

      Filesize

      19KB

      MD5

      1b691bb471660c064a30e159bc156d25

      SHA1

      31e5129cf89dd20eedf400e13e41785f8ab049de

      SHA256

      dd841bc52a05aba3635172cc4af2687f9e5c896fc22ea10185bb370ffd43e16f

      SHA512

      b63a20ec64c046289ea60c9c4ba394d6739371bed8b58a798fa15d9ab2dda145da231d8186e366c05422e5633fde9b46edf78af8f8ef81ea12a7b3b3b1d818b6

    • C:\Users\Admin\AppData\Local\Temp\jzfjgshg.exe

      Filesize

      234KB

      MD5

      25ff024ae3b00e8dc5d53d82681d25e5

      SHA1

      d09df86d87cc2a7e022358eb388feb4f33234ebc

      SHA256

      20d829712638e1cf6dac27bdcc57f247a24a7de8fba941568dd41e869d84f75c

      SHA512

      32f5e4ccdaaa1c56c85419576b0e8ed247b9fdd12e2a3c6e76f2e4f46218dfe46fcff790b87d75d49b901442336b9b6ace767ddc148e8c10923292504d40ee75

    • C:\Users\Admin\AppData\Local\Temp\jzfjgshg.exe

      Filesize

      234KB

      MD5

      25ff024ae3b00e8dc5d53d82681d25e5

      SHA1

      d09df86d87cc2a7e022358eb388feb4f33234ebc

      SHA256

      20d829712638e1cf6dac27bdcc57f247a24a7de8fba941568dd41e869d84f75c

      SHA512

      32f5e4ccdaaa1c56c85419576b0e8ed247b9fdd12e2a3c6e76f2e4f46218dfe46fcff790b87d75d49b901442336b9b6ace767ddc148e8c10923292504d40ee75

    • C:\Users\Admin\AppData\Local\Temp\jzfjgshg.exe

      Filesize

      234KB

      MD5

      25ff024ae3b00e8dc5d53d82681d25e5

      SHA1

      d09df86d87cc2a7e022358eb388feb4f33234ebc

      SHA256

      20d829712638e1cf6dac27bdcc57f247a24a7de8fba941568dd41e869d84f75c

      SHA512

      32f5e4ccdaaa1c56c85419576b0e8ed247b9fdd12e2a3c6e76f2e4f46218dfe46fcff790b87d75d49b901442336b9b6ace767ddc148e8c10923292504d40ee75

    • C:\Users\Admin\AppData\Local\Temp\jzfjgshg.exe

      Filesize

      234KB

      MD5

      25ff024ae3b00e8dc5d53d82681d25e5

      SHA1

      d09df86d87cc2a7e022358eb388feb4f33234ebc

      SHA256

      20d829712638e1cf6dac27bdcc57f247a24a7de8fba941568dd41e869d84f75c

      SHA512

      32f5e4ccdaaa1c56c85419576b0e8ed247b9fdd12e2a3c6e76f2e4f46218dfe46fcff790b87d75d49b901442336b9b6ace767ddc148e8c10923292504d40ee75

    • C:\Users\Admin\AppData\Local\Temp\jzfjgshg.sfx.exe

      Filesize

      459KB

      MD5

      7eb26e1af91272a1f854376abb42070c

      SHA1

      5f31cec81e54ecf59953fde86ad8f09823a8431f

      SHA256

      72c92e967547988bf22adc7f66304780efc3f70627dfd4e54024dd2f9f68c634

      SHA512

      264998421b7baa475836f03ee5ed0c6005528a404d172125ee680a784a09c4673385fc5e374dc6a5d99106a235db36e201da8138c47cfcd1e6cbcd3d64b45cee

    • C:\Users\Admin\AppData\Local\Temp\jzfjgshg.sfx.exe

      Filesize

      459KB

      MD5

      7eb26e1af91272a1f854376abb42070c

      SHA1

      5f31cec81e54ecf59953fde86ad8f09823a8431f

      SHA256

      72c92e967547988bf22adc7f66304780efc3f70627dfd4e54024dd2f9f68c634

      SHA512

      264998421b7baa475836f03ee5ed0c6005528a404d172125ee680a784a09c4673385fc5e374dc6a5d99106a235db36e201da8138c47cfcd1e6cbcd3d64b45cee

    • C:\Users\Admin\AppData\Local\Temp\tmpA2C8.tmp.bat

      Filesize

      148B

      MD5

      c0456ef4db137e6689b6e8d17d391258

      SHA1

      5066e28f18f22b6cd7abc9330eedd36d681df5a9

      SHA256

      89c3e5dc30af401f5f328c11735c7161ae71997d57ca31e9dc3163d84f216229

      SHA512

      ffed748fdb6d4f901a03e3b791769addf43a7affa558928cfa994116b93f190976e08e8ea780b369557f40b4596c36c41c536948dd474f7a14a4703c75392570

    • C:\Users\Admin\AppData\Roaming\cesr.exe

      Filesize

      234KB

      MD5

      25ff024ae3b00e8dc5d53d82681d25e5

      SHA1

      d09df86d87cc2a7e022358eb388feb4f33234ebc

      SHA256

      20d829712638e1cf6dac27bdcc57f247a24a7de8fba941568dd41e869d84f75c

      SHA512

      32f5e4ccdaaa1c56c85419576b0e8ed247b9fdd12e2a3c6e76f2e4f46218dfe46fcff790b87d75d49b901442336b9b6ace767ddc148e8c10923292504d40ee75

    • C:\Users\Admin\AppData\Roaming\cesr.exe

      Filesize

      234KB

      MD5

      25ff024ae3b00e8dc5d53d82681d25e5

      SHA1

      d09df86d87cc2a7e022358eb388feb4f33234ebc

      SHA256

      20d829712638e1cf6dac27bdcc57f247a24a7de8fba941568dd41e869d84f75c

      SHA512

      32f5e4ccdaaa1c56c85419576b0e8ed247b9fdd12e2a3c6e76f2e4f46218dfe46fcff790b87d75d49b901442336b9b6ace767ddc148e8c10923292504d40ee75

    • C:\Users\Admin\AppData\Roaming\cesr.exe

      Filesize

      234KB

      MD5

      25ff024ae3b00e8dc5d53d82681d25e5

      SHA1

      d09df86d87cc2a7e022358eb388feb4f33234ebc

      SHA256

      20d829712638e1cf6dac27bdcc57f247a24a7de8fba941568dd41e869d84f75c

      SHA512

      32f5e4ccdaaa1c56c85419576b0e8ed247b9fdd12e2a3c6e76f2e4f46218dfe46fcff790b87d75d49b901442336b9b6ace767ddc148e8c10923292504d40ee75

    • memory/1076-30-0x0000000005620000-0x0000000005626000-memory.dmp

      Filesize

      24KB

    • memory/1076-23-0x0000000000960000-0x00000000009A0000-memory.dmp

      Filesize

      256KB

    • memory/1076-28-0x0000000005C90000-0x0000000006234000-memory.dmp

      Filesize

      5.6MB

    • memory/1076-27-0x0000000005640000-0x00000000056DC000-memory.dmp

      Filesize

      624KB

    • memory/1076-22-0x0000000074AF0000-0x00000000752A0000-memory.dmp

      Filesize

      7.7MB

    • memory/1076-26-0x00000000052E0000-0x000000000531E000-memory.dmp

      Filesize

      248KB

    • memory/1076-35-0x0000000074AF0000-0x00000000752A0000-memory.dmp

      Filesize

      7.7MB

    • memory/1076-29-0x00000000056E0000-0x0000000005772000-memory.dmp

      Filesize

      584KB

    • memory/1076-24-0x00000000052D0000-0x00000000052D6000-memory.dmp

      Filesize

      24KB

    • memory/1076-25-0x0000000005270000-0x0000000005280000-memory.dmp

      Filesize

      64KB

    • memory/1740-42-0x0000000074AF0000-0x00000000752A0000-memory.dmp

      Filesize

      7.7MB

    • memory/1740-38-0x0000000004E00000-0x0000000004E66000-memory.dmp

      Filesize

      408KB

    • memory/1740-37-0x0000000004C60000-0x0000000004C70000-memory.dmp

      Filesize

      64KB

    • memory/1740-36-0x0000000074AF0000-0x00000000752A0000-memory.dmp

      Filesize

      7.7MB

    • memory/1740-31-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/2580-47-0x00000000751B0000-0x0000000075960000-memory.dmp

      Filesize

      7.7MB

    • memory/2580-48-0x0000000002AD0000-0x0000000002AE0000-memory.dmp

      Filesize

      64KB

    • memory/2580-52-0x00000000751B0000-0x0000000075960000-memory.dmp

      Filesize

      7.7MB